关注
Yun Luo
Yun Luo
State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou
在 gzu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
An entropy-view secure multiparty computation protocol based on semi-honest model
Y Luo, Y Chen, T Li, Y Wang, Y Yang, X Yu
Journal of Organizational and End User Computing (JOEUC) 34 (10), 1-17, 2022
72022
VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
Y Tang, Y Chen, Y Luo, S Dong, T Li
Applied Sciences 13 (7), 4166, 2023
32023
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
Y Luo, Y Chen, T Li, C Tan, H Dou
Journal of Cloud Computing 13 (1), 22, 2024
22024
Using information entropy to analyze secure multi-party computation protocol
Y Luo, Y Chen, T Li, Y Wang, Y Yang
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
22021
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems
Z He, Y Chen, Y Luo, L Zhang, Y Tang
Entropy 26 (1), 45, 2023
12023
Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment
L Zhang, Y Chen, Y Luo, Z He, T Li
Applied Sciences 13 (7), 4355, 2023
12023
MDIFL: Robust federated learning based on malicious detection and incentives
R Wu, Y Chen, C Tan, Y Luo
Applied Sciences 13 (5), 2793, 2023
12023
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption
Y Luo, Y Chen, H Dou, C Tan, H Zhou
Information Processing & Management 61 (5), 103789, 2024
2024
Cross-chain asset trading scheme for notaries based on edge cloud storage
L Chen, Y Chen, C Tan, Y Luo, H Dou, Y Yang
Journal of Cloud Computing 13 (1), 90, 2024
2024
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model
C Shu, Y Chen, C Tan, Y Luo, H Dou
Journal of Cloud Computing 13 (1), 4, 2024
2024
A Blockchain of Blockchains Structure Based on Asset Trading Scheme
S Huang, Y Chen, C Tan, H Dou, Y Luo, Y Yang
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain
L Yuan, Y Yang, C Tan, H Dou, Y Luo, Y Chen
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
Adversarial Attack Method Based on Dual-frequency Domain Transformation
M Xiong, Y Chen, H Dou, Y Luo, C Tan, Y Zhang
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
Robust Object Detection Based on a Comparative Learning Perspective
H Yang, Y Chen, H Dou, Y Luo, C Tan, Y Zhang
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
Communication-Efficient Federated Learning with Sparsity and Quantization
Z Long, Y Chen, H Dou, Y Luo, C Tan, Y Sun
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
A High Capacity Combined Carrier Steganography Without Embedding Image
Y Zhang, Y Chen, H Dou, Y Luo, C Tan, M Xiong
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
L Chen, Y Chen, C Tan, H Dou, Y Luo, P Chen
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
R Shi, Y Chen, C Tan, Y Luo, T Li
Journal of Cloud Computing 12 (1), 117, 2023
2023
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption
Y Luo, Y Chen, T Li, Y Wang
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–19